Sie sind auf Seite 1von 8

Intelligence Fundamentals

China has a very large military 150,000 soldiers marching at the parade.
To be an intelligence officer/agent you need to be able to travel.

Information is not intelligence. Information is knowledge in the raw form.


Intelligence:
Information that is capable of being understood
Information with added value
Information that has been evaluated in context to its source and reliability
Analysis (of either information or intelligence):
The resolving of separating of a thing into its component parts
Ascertainment of those parts
The tracing of things to their source to discover the general principles behind them.
A table or statement of the results of this process.
Information + Evaluation = Intelligence
Intelligence Four Eyes:
Britain
United States
Canada
Australia
(Sometimes: New Zealand)
CSIS Definition of Intelligence: In the present context, intelligence refers to the product
resulting from the collection, collation, evaluation and analysis of information
Three Categories of Intelligence:
1. Strategic Intelligence national level issues, government policies
2. Operational Intelligence middle management, operation within an organization, (ex.
Breaking up a terror ring)
3. Tactical Intelligence individual/group level
Intelligence Community in Canada:
Military / CFIC / Communications Security Establishment (signal spies)
CSIS
RCMP and INSET (Integrated National Security Enforcement Team)
Provincial/Municipal Police (Provincial Anti-Terrorist Squad PATS)
Military Intelligence (Canadian Military Intelligence Branch)
Canadian Forces Intelligence Command (was once CDI)
o Analysts who gather information and decide whether they get pulled into an
operation domestically/internationally

Communications Security Establishment


o Run by the Ministry of Defense, not very well known, deal with communications
and with embassies

Canadian Security Intelligence Service (CSIS)


Mandate to investigate activities suspected of constituting threats to the security of
Canada, and to report on these to the Government of Canada.
Key partners: they have a relationship with RCMP and local police departments. When
something suspicious is discovered by police, it may move up the chain to CSIS. (Other
key partners: border services, immigration services, natural resources, etc.)
A main goal for these agencies is to cooperate and share intelligence, but unfortunately
CSIS doesnt like to share information too much.
Royal Canadian Mounted Police and Integrated National Security Team
Enhance partner agencies collective ability to combat national security threats and meet
specific mandate responsibilities.
Mandate to increase the capacity to collect, share, and analyze intelligence among
partners, with respect to targets (individuals) that are threat to national security.
To create an enhanced enforcement capacity to bring such targets to justice.
Criminal Intelligence Service Canada (CISC)
Provincial affiliations (Criminal Intelligence Service Ontario CISO)
o Mandate is to provide and coordinate national criminal intelligence effort.
Focused strategically and operationally.
Criminal Police Information Center (CPIC)
Intelligence Types:
HUMINT human intelligence
ELINT electronic intelligence
SIGINT signals intelligence
IMINT imaging intelligence
GEOINT geo-spatial intelligence
OSINT open-sources intelligence
MASINT measures and signature intelligence
SOCINT social and cultural intelligence
HUMINT Human Intelligence:
Collection
Interrogation
ELINT Electronic Intelligence:
By electronic means
Always classified
SIGINT Signals Intelligence:
People overlap with ELINT

Information from satellites, transmissions, communications


ECHELON: major SIGINT operation, a large satellite in space that catches transmissions
and communications

IMINT Imaging Intelligence:


Generally, collection via image satellite or reconnaissance aircraft
Modern uses of drones
GEOINT Geo-Spatial Intelligence:
Imagery intelligence to recreate models of maps and spaces
Now includes MASINT and GIS
Socio-cultural relationship
Using radio satellites
OSINT Open Source Intelligence:
produced from publically available information that is collected, exploited, and
disseminated in a timely manner to an appropriate audience for the purpose of addressing
a specific intelligence requirement.
All public information; Google, newspapers, books, banks, insurance companies, etc.
MASINT Measurements and Signatures Intelligence:
Radar
Radio frequencies
Geo-physical
Nuclear radiation
Materials
Electro-optical
SOCINT Social-Cultural Intelligence:
Observing
Analyzing elements such as the land, the people, and their communities.
Intelligence Cycle:

Direction, Collection, Processing, Dissemination


class model

Direction: Planning ahead and finding a direction/goal.


Collection: Listening and gathering information.
Collection Planning:
Assets
Priorities
Task-assignment
Evaluation and Updates (re-task)
CCIR Commanders Critical Information Requirements
PIRs Primary Intelligence Requirements
Processing: Discovering barriers and being able to estimate results.
Dissemination: Putting out a product that makes sense for the specific level of intelligence.
ASIC All Source Intelligence Centre
These centers existed on international intelligence-effort land (ex. Afghanistan).
They would receive data from different country bases. (recipients of data)
Analysists worked with all the information to solve problems.
Intelligence Methods:
Link Analysis
o An analysis conducted (often through a visual chart) that demonstrates the linkage
between individuals, locations, and data associated with an operation.
o Computer program for digital Link Analysis: i2 Analyze
o Data analysis technique used to evaluate relationships or connections between
network nodes.

Association Matrix
o A chart that builds confirmed and unconfirmed suspects in an operation.

Timeline Analysis
o A visual timeline showing the connections, alibies, and connections related on an
operation.

Geospatial Analysis
o Gathering, displaying, and manipulating imagery, GPS, satellite photography, and
historical data, described explicitly in terms of geographic coordinates or
implicitly, in terms of a street address, postal code, or forest stand identifier as
they are applied to geographic models.

History and Origin of Intelligence


Send some men to explore the land of Canaan, which I am giving to the Israelites. From each
ancestral tribe send one of its leaders. Numbers 13:1.
Sun Tzu 544 496 BC
There are five kinds of spy: The local spy, the inside spy, the reverse spy, the dead spy, and the
living spy. When the five kinds of spies are all active, no one knows their routes this is called
organizational genius, and is valuable to the leadership.
British Intelligence:
MI6 foreign intelligence
MI5 domestic intelligence
Often responsible for subversion, espionage, cold war intelligence

US Intelligence:
Central Intelligence Agency (CIA)
Defense Intelligence Agency
Office of Naval Intelligence
National Geospatial Intelligence Agency
National Security Agency (NSA)
Canadian Intelligence:
Coureur des Bois (runners of the woods) in the 1700s, provided intelligence to the settlers
and First Nations tribes.
RCMP
CSIS
Canadian Communications Security Establishment
Canada owns several radar satellites to provide them with intelligence.
Australian Intelligence Community
Australian Intelligence Bureau
Australian Secret Intelligence Organization
Australian Secret Intelligence Service
Australian Signals Directorate
Australian Defense Organization
Australian Geospatial-Intelligence Organizational
Four/Five Eyes
Intelligence in Canada Today
Current Issues:
o Drug smuggling
o Biker gangs
o Organized crime groups (mafia)
Civil Liberties and Intelligence Collection
Bill C 51
Secret Trials
Challenges for the Intelligence Community in Canada:
1. Cooperation and Communication
2. Domestic and International Operations
Bill C-51
Act of Parliament that broadened the authority of Canadian government agencies to share
information about individuals easily. Key is they it enabled CSIS to disrupt terror organizations.
Intergovernmental Challenges:
Process
Jurisdiction
Classification

Federal Secrecy Clearance


In the National Interest
Top Secret (Level III)
Secret (Level II)
Confidential (Level I)

Not in the National Interest


Protected (C)
Protected (B)
Protected (A)

The secrecy level is based on the damage the government would have if the secret were to get
out.
Intelligence within the national interest has the capability of harming the country. Intelligence
not within the national interest has the capability of harming the source, but not the country.
Protecting Intelligence
Internet
o The main problem is people. They break rules and make up very easy passwords
and encryptions.
Physical security
o People with computer/phones that have security clearances should not leave their
devices anywhere without watching it, constantly.
Counter Intelligence
Working to stop intelligence operations on yourself.
Stopping the collection of information.
Killing with Keyboards
Cyber Terrorism
Emerging Threats
Terrorism
International drug trade
Transnational crime
Illegal immigration and human trafficking
Industrial espionage government planting spies at companies in a foreign country to get
intelligence (obtain employee lists, etc.)
What is Crime Analysis?
A systematic process of collecting, categorizing, analyzing, and disseminating timely, accurate,
and useful information that describes crime patterns, crime trends, and potential suspects.
What is Intelligence Analysis?
The systematic collection, evaluation, analysis, integration, and disseminations of information on
criminals, especially related to their association and their identification with criminal activity of
an organized nature.
All Source Intelligence
Intelligence products and/or organizations and activities that incorporate all sources of
information, most frequently including human resources intelligence, imagery intelligence,

measurement and signature intelligence, signals intelligence, and open-source data in the
production if finished intelligence.

Fusion Cell:
Multi jurisdiction unit with focus of working towards common goals, specifically the gathering
of information, development of intelligence and timely sharing of actionable intelligence.
Fusion Cell Challenges:
Very few of the leadership understand the intelligence process, let alone establish an
intelligence center.
Maintain an eye on civil liberties
Operation and maintenance is very high (very expensive)

Das könnte Ihnen auch gefallen